1 / 10

Mukesh Jagasia & Seung Chul Jung Group # 14

Mukesh Jagasia & Seung Chul Jung Group # 14. A Distributed Approach for Malicious Node Detection and Elimination in Cluster based Wireless Sensor Networks. Motivation & Goals. Primary To prevent data theft A prominent security threat To establish trust within a WSN

jewell
Download Presentation

Mukesh Jagasia & Seung Chul Jung Group # 14

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mukesh Jagasia & Seung Chul Jung Group # 14 A Distributed Approach for Malicious Node Detection and Elimination in Cluster based Wireless Sensor Networks

  2. Motivation & Goals Primary To prevent data theft A prominent security threat To establish trust within a WSN Better than authenticating at every step Secondary Wireless Sensor Networks Novel MAC layer-oriented research Wide application array

  3. Project Description Anomaly based technique Cluster based WSN Cluster head rotation But could do without too! Sensor MAC IEEE 802.11 DCF Homogeneity With respect to networking interfaces Decent behavior assumed No? Collision? Fine ...

  4. Technical Details Malicious Node Detection Protocol Flavors Decentralized version – cluster-head based Distributed version – consensus-based Measurement criteria RTS requests raised Fast depleting energy levels of sensor nodes Malicious Node Masquerade Attack Prevention Malicious Node Elimination Protocol

  5. Technical Details Malicious Node Masquerade Attack Symmetric encryption technique Every SN sends encrypted RTS to CH Anonymous ID communication model Assumptions No known cipher-text attack possible Replay attack – assure data freshness Add time-stamp Discard messages with same time-stamp from same sensor node ID

  6. Technical Details Distributed Malicious Node Detection

  7. Technical Details Distributed Malicious Node Detection

  8. Risks and Benefits Novel aspects of this project: Malicious Node Detection – # of RTS requests raised Distributed Malicious Node Detection Protocol - Consensus based approach Risks/challenges: To prove it! Energy level scheme for malicious node detection Potential applications & benefits: A good alternative to authenticating at every step Everywhere where WSN can be used To prevent stealing data

  9. Conceptualized the project Analyzed and scoped the problem at hand Designed and proposed a novel scheme Implementation Reading and evaluating various WSN alternatives Simulation alternatives Tasks Accomplished by Now

  10. DELIVERABLES & MILESTONESTill 11/14/2007 Origination of ideas – 09/28 DONE! Solidification – 10/01 DONE! Interim Proposal – 10/14 DONE! Implementation – 11/14 In progress ... Final Report & Presentation – 11/14 In progress ...

More Related